Skip to content
View franc205's full-sized avatar

Highlights

  • Pro

Block or report franc205

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
franc205/README.md

Hi πŸ‘‹, I'm Fran Canteli

Offensive Security Engineer Β· Buenos Aires, Argentina πŸ‡¦πŸ‡·

I specialize in identifying realistic attack paths, chaining vulnerabilities, and demonstrating business-impacting risk across web, mobile, cloud, and infrastructure environments.

πŸ§‘β€πŸ’» About me

πŸ“ Buenos Aires, Argentina
πŸ› οΈ Senior Offensive Security Engineer
πŸ”§ I deliver advanced penetration testing and lead offensive security initiatives.
πŸŽ“ 7+ years of hands-on experience in AppSec and Red Teaming.
🌱 Passionate about Attack Path Discovery, Exploit Validation, and practical high-impact techniques.

πŸš€ What I do

πŸ“± Application Security: Web and Mobile Penetration Testing.
☁️ Infrastructure: Cloud, Internal, and External Penetration Testing.
🧠 Vulnerability Management: Exploit validation, impact analysis, and remediation guidance.
🧰 Red Teaming: Attack Path Discovery, Privilege Escalation, and Post-Exploitation.

πŸ“« Connect with me

LinkedIn Twitter Email

πŸ† Certifications

CRTL

CRTO

BSCP

OSCP

CEH

eJPT

πŸ’» Languages and technologies

Scripting & Automation

Cloud & Infrastructure

Offensive Security

🎀 Talks & Workshops

2025

2024

  • Ekoparty: Red Team Space: From Network to Network: Hands-On Pivoting Techniques in Internal Environments | πŸ“Š Slides
  • DEFCON: Red Team Village: From Network to Network: Hands-On Pivoting Techniques in Internal Environments | πŸ“Š Slides

2023

  • Ekoparty: Red Team Space: From Network to Network: Hands-On Pivoting Techniques in Internal Environments | πŸ“Š Slides

2021

2020

Pinned Loading

  1. dvpe dvpe Public

    An immersive, multi-container environment designed to practice network pivoting and lateral movement techniques.

    Shell 47 7

  2. Echo433 Echo433 Public

    A powerful, Arduino-based 433MHz signal sniffer and cloner.

    C++ 39 1

  3. ArduinoDucky ArduinoDucky Public

    Make your own Rubber Ducky With an Arduino UNO!

    Arduino 17 5

  4. AD-workshop AD-workshop Public

    Recursos del Workshop de Active Directory

    8 2